home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 362 of 2,445   
   Mike Powell to All   
   A cracked malicious versi   
   06 Feb 25 10:32:00   
   
   TZUTC: -0500   
   MSGID: 67.consprcy@1:2320/105 2c0a0d66   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   A cracked malicious version of a Go package lay undetected online for years   
      
   Date:   
   Wed, 05 Feb 2025 16:04:00 +0000   
      
   Description:   
   Someone's been abusing GitHub's Go Module Mirror service, allowing the attack   
   to persist.   
      
   FULL STORY   
   ======================================================================   
    - Someone forked a popular database module and fitted it with malware   
    - The malicious fork was then cached and stored indefinitely   
    - It was then creatively hidden in plain sight to target Go developers   
      
   A software supply chain attack targeting developers on the Go platform was   
   apparently hiding in plain sight for three years to spread malware , experts   
   have warned.    
      
   Cybersecurity researchers from Socket Security uncovered and publicly spoke   
   about the campaign, which started back in 2021, when someone took a    
   relatively popular database module called BoltDB on GitHub and forked it. In   
   the fork, they added malicious code, which granted the attacker backdoor   
   access to compromised computers.    
      
   That instance was then cached indefinitely by the Go Module Mirror service.   
      
   Abusing Go Module Mirror    
      
   For those unfamiliar with Go Module Mirror, it is a proxy service operated by   
   Google that caches and serves Go modules to improve reliability,    
   availability, and performance. It ensures that Go modules remain accessible   
   even if the original source is modified, deleted, or becomes temporarily   
   unavailable.    
      
   After the instance was cached, the attacker changed the Git tags in the    
   source repository, to redirect visitors to the benign version, essentially   
   hiding the malware in plain sight.    
      
   "Once installed, the backdoored package grants the threat actor remote access   
   to the infected system, allowing them to execute arbitrary commands,"    
   security researcher Kirill Boychenko said in his report .    
      
   Speaking to TheHackerNews , Socket said this is one of the earliest recorded   
   instances of threat actors taking advantage of the Go Module Mirror service.    
      
   "This is possible because Git tags are mutable unless explicitly protected,"   
   Socket said. "A repository owner can delete and reassign a tag to a different   
   commit at any time. However, the Go Module Proxy had already cached the   
   original malicious version, which was never updated or removed from the    
   proxy, allowing the attack to persist."    
      
   The malicious version ended up permanently accessible through the Go Module   
   Proxy, Boychenko explained. "While this design benefits legitimate use cases,   
   the threat actor exploited it to persistently distribute malicious code   
   despite subsequent changes to the repository."    
      
   Boychenko said that he reported his findings and awaits for the removal of    
   the malicious content: As of this publication, the malicious package remains   
   available on the Go Module Proxy. We have petitioned for its removal from the   
   module mirror and have also reported the threat actors GitHub repository and   
   account, which were used to distribute the backdoored boltdb-go package.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/a-cracked-malicious-version-of-a-go-pac   
   kage-lay-undetected-online-for-years   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca